Top-Rated Free Essay
Preview

unit 7 assignment 1

Satisfactory Essays
547 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 7 assignment 1
Unit 7 Assignment 1 |
Implementation of Authentication Process |
|
|
WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.
If a WLAN were implemented into the school, it would need to have groups with users assigned to their pertinent groups. Possible groups include students, teachers, IT department, administration, counselors, and high-level admin (Principals, Vice Principals). Of course, within the teachers/educators group, would be all teachers in the classroom. Within the IT department group would be the IT department and any other employees involved in managing and configuring any IT systems. Within the administrators group would be anyone in the front office and does daily administration duties within the school. Counselors would include any student or education counselors in the office. Lastly, high-level administrators would be the highest ranking individuals in the school including the Principal and Vice Principal.
With any network, including a WLAN, there are inherent risks involved. With a WLAN, the wireless aspect opens up additional avenues for hackers or data being compromised. There could be tech-savvy students who could access the network and get into data that they shouldn’t see or modify. A student could obtain the teachers credentials by simply looking over their shoulder or watching them. Also, any outside entities could get within range of the wireless and access the network, if they’re good enough. Wireless can be easily intercepted and accessed.
If I were to develop a simple classification plan for the school system WLAN, it would involve four categories: Private, sensitive, restricted, and proprietary. Depending on the individual’s job title, need to know, and what they need to do their job properly, they will have access to certain levels of the aforementioned scheme. Any given employee will not have more than they need so that information is protected.
In regards to students and any applications they would need, I would narrow it down to the student portal that has only education-related materials. This would keep them off of any counterproductive applications and free up bandwidth for the teachers. Any applications that teachers need, such as the grade book software or any application needed for their daily plans. Administrators would need the software with pertinent student information within the database. Counselors would need the same software, but a bit more in-depth so that they can see all student information. All except students would need to utilize email as well.
I believe PDAs should only be allowed and issued to high-level administrators and any IT individual that is on call. This would narrow the risk of unauthorized access and limit the amount of people with remote access in the form of a PDA. High-level administrators would need it to keep in touch with any people they need to, and remain up-to-date on events involving their school. IT would need one or two so that they can have it at all times, no matter where they are at and can be contacted easily in case of emergency.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The optimized WLAN architecture, with its distributed traffic forwarding, will not require Highbrow Ed to significantly change their LAN backbone. Highbrow Ed will need to upgrade their WLAN infrastructure to migrate from the 802.11b network to 802.11n network. However, Highbrow Ed will see an increase in productivity and enhanced collaboration solutions. The conversion to the 802.11n architecture will increase their area of coverage for the campus both in the structures and outdoors. 802.11n boosts network capacity and speed up to 600Mbps, and supports voice and data transfers.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ is a free stumbler application for Mac OS X that puts the computer’s wireless card into monitor mode.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    *Build a new IT wing for the administration building so that all of the servers can be centralized…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    a. Closing off unused ports via a firewall to reduce the chance of unwanted network access…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3350

    • 588 Words
    • 3 Pages

    The potential user groups and users of WLAN in a school environment would be District office and administration can streamline procedures. Classroom applications can track each student’s progress to facilitate reporting, provide up-to-date student information on hand held computers, respond to emergency situations, and handle disciplinary incidents, security enforcement, and parent communications. IT department can optimize performance and cost savings. WLANs can accommodate rapid expansion, which is particularly important for schools using mobile classrooms, which can make wiring very challenging. WLANs are also more economical than traditional wired connections, especially where wired connections would be prohibitively difficult like, schools that have no space for computer labs or that anticipate future renovations that would require rewiring in classrooms. Teachers can be more proactive and accessible. WLAN access increase interaction between teacher and students; complement classroom instructions with online applications including digital whiteboards and online testing; real time access to administrative resources and design curricula that better meets individual learning styles Students can learn more efficiently. WLAN provides the opportunity for more free flowing collaboration among peers, with teachers and digital resources and the Internet. While higher education deployments focus broadly on delivering high-performance, pervasive wireless coverage across large campus environments, K-12 schools with tighter budgets and limited IT resources tend to deploy wireless to support specific mobility applications, such as mobile carts, wireless IP telephony, video surveillance, mobile classrooms, and so on. In order to support these and other emerging wireless applications for example, educational videos, location tracking, and cafeteria point-of-sales systems, schools need a wireless infrastructure that can deliver reliable performance in dynamic, high-density…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Wlan vs Lan's

    • 520 Words
    • 3 Pages

    In life today, networking has become a large part of our lives. It is the fastest way to transport data, and it is accessible wherever you are in the world. These connections are called LANs. LAN (local area network) is a group of computers and other electronic devices that are connected via a communications line. The LAN’s I will talk about are wired and wireless LANS. Before wireless networking, everything was connected with wires. However, today data can be transported wirelessly as well. In this paper, I will talk about how I would go about practicing my LAN design.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A wireless policy for a medium-sized banking organization will need to deploy a wireless LAN to the network and there will not need to be onsite IT staff as that can be outsourced to various vendors and business specializing in such. The remote access can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system.…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure…

    • 900 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NETW410 Week 2

    • 285 Words
    • 2 Pages

    Provide open wireless access for the students and the local population in the areas outside of each building.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.…

    • 3481 Words
    • 14 Pages
    Powerful Essays